Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications

In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the...

Full description

Bibliographic Details
Main Authors: Andrii Shalaginov, Muhammad Ajmal Azad
Format: Article
Language:English
Published: MDPI AG 2021-10-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/13/11/272
_version_ 1797510241372340224
author Andrii Shalaginov
Muhammad Ajmal Azad
author_facet Andrii Shalaginov
Muhammad Ajmal Azad
author_sort Andrii Shalaginov
collection DOAJ
description In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the IoT ecosystem is data which exists in various forms and formats. The collected data is then later used to create context awareness and make meaningful decisions. Besides an undoubtedly large number of advantages from the usage of IoT, there exist numerous challenges attributed to the security of objects that cannot be neglected for uninterrupted services. The Mirai botnet attack demonstrated that the IoT system is susceptible to different forms of cyberattacks. While advanced data analytics and Machine Learning have proved efficiency in various applications of cybersecurity, those still have not been explored enough in the literature from the applicability perspective in the domain of resource-constrained IoT. Several architectures and frameworks have been proposed for defining the ways for analyzing the data, yet mostly investigating off-chip analysis. In this contribution, we show how an Artificial Neural Network model can be trained and deployed on trivial IoT nodes for detecting intelligent similarity-based network attacks. This article proposes a concept of the resource-constrained intelligent system as a part of the IoT infrastructure to be able to harden the cybersecurity on microcontrollers. This work will serve as a stepping stone for the application of Artificial Intelligence on devices with limited computing capabilities such as end-point IoT nodes.
first_indexed 2024-03-10T05:28:47Z
format Article
id doaj.art-ac4e374a77354e308db2e94185e321bd
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-10T05:28:47Z
publishDate 2021-10-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-ac4e374a77354e308db2e94185e321bd2023-11-22T23:26:21ZengMDPI AGFuture Internet1999-59032021-10-01131127210.3390/fi13110272Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart ApplicationsAndrii Shalaginov0Muhammad Ajmal Azad1Department of Technology, Kristiania University College, 0107 Oslo, NorwaySchool of Computer Science, University of Derby, England DE22 1GB, UKIn recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improving quality of life. The core component of the IoT ecosystem is data which exists in various forms and formats. The collected data is then later used to create context awareness and make meaningful decisions. Besides an undoubtedly large number of advantages from the usage of IoT, there exist numerous challenges attributed to the security of objects that cannot be neglected for uninterrupted services. The Mirai botnet attack demonstrated that the IoT system is susceptible to different forms of cyberattacks. While advanced data analytics and Machine Learning have proved efficiency in various applications of cybersecurity, those still have not been explored enough in the literature from the applicability perspective in the domain of resource-constrained IoT. Several architectures and frameworks have been proposed for defining the ways for analyzing the data, yet mostly investigating off-chip analysis. In this contribution, we show how an Artificial Neural Network model can be trained and deployed on trivial IoT nodes for detecting intelligent similarity-based network attacks. This article proposes a concept of the resource-constrained intelligent system as a part of the IoT infrastructure to be able to harden the cybersecurity on microcontrollers. This work will serve as a stepping stone for the application of Artificial Intelligence on devices with limited computing capabilities such as end-point IoT nodes.https://www.mdpi.com/1999-5903/13/11/272cybersecuritysmart citiessmart applicationsnetwork attacksmachine learninginternet of things
spellingShingle Andrii Shalaginov
Muhammad Ajmal Azad
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
Future Internet
cybersecurity
smart cities
smart applications
network attacks
machine learning
internet of things
title Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_full Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_fullStr Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_full_unstemmed Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_short Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
title_sort securing resource constrained iot nodes towards intelligent microcontroller based attack detection in distributed smart applications
topic cybersecurity
smart cities
smart applications
network attacks
machine learning
internet of things
url https://www.mdpi.com/1999-5903/13/11/272
work_keys_str_mv AT andriishalaginov securingresourceconstrainediotnodestowardsintelligentmicrocontrollerbasedattackdetectionindistributedsmartapplications
AT muhammadajmalazad securingresourceconstrainediotnodestowardsintelligentmicrocontrollerbasedattackdetectionindistributedsmartapplications